Web Tricks Tips and techniques from the world of web development.Aug 31, 2008
Busy web developers are always looking for an edge. This month we explore some tricks for faster and more effective websites.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalAug 31, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
Apache Load Balancing Load balancing with the Apache http serverAug 31, 2008
Today's web performance and availability requirements make load balancing indispensable. In this article, we show you how to set up an effective load balancing system using features built into the Apache web server.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
Aptana The Aptana Free developer environment for AJAXJul 11, 2008
Aptana is an extremely convenient GUI for AJAX development. You can use this versatile IDE as a stand-alone solution or an Eclipse plugin.more »
Web-based Office Tools Online office suitesJul 11, 2008
A mobile office without a laptop? No problem – a new generation of web applications converts your browser into a word processor or spreadsheet.more »
Ajaxterm Remote access despite blocked SSH ports with AjaxtermJul 11, 2008
Public Internet access is often protected by restrictive firewalls, and you have no chance of running SSH. However, HTTPS over port 443 is typically permitted. Ajaxterm lets mobile users login to their home servers.more »
Web Videos Tools and techniques for publishing your videos on the webJul 10, 2008
We’ll show you how to convert your videos to FLV format and play them from your website with FlowPlayer.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm